Results 81 to 90 of about 35,561 (292)
Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions [PDF]
In this paper, we analyze the collision resistance of SHA-2 and provide the first results since the beginning of the NIST SHA-3 competition. We extend the previously best known semi-free-start collisions on SHA-256 from 24 to 32 (out of 64) steps and show a collision attack for 27 steps.
Florian Mendel +2 more
openaire +1 more source
Criticality Aware Soft Error Mitigation in the Configuration Memory of SRAM based FPGA
Efficient low complexity error correcting code(ECC) is considered as an effective technique for mitigation of multi-bit upset (MBU) in the configuration memory(CM)of static random access memory (SRAM) based Field Programmable Gate Array (FPGA) devices ...
Chakrabarti, Amlan +4 more
core +1 more source
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li +7 more
wiley +1 more source
Antimicrobial peptides (AMPs) are a promising class of therapeutic alternatives with broad-spectrum activity against resistant pathogens. Small AMPs like temporin-SHa (1) and its first-generation analog [G10a]-SHa (2) possess notable efficacy against ...
Arif Iftikhar Khan +8 more
doaj +1 more source
This study reveals that XPC regulates autophagy signaling beyond its noncanonical DNA repair role, uncovering the XPC‐p‐ATM‐KDM4A‐PHRF1 axis as a novel mechanism for autophagy modulation under DNA damage stress. It identifies PHRF1 as a novel p53 ubiquitin ligase.
Baixiong Zhao +10 more
wiley +1 more source
Exposure to second-hand aerosol produced by electronic cigarettes: a systematic review
Background Since 2007, the use of electronic cigarettes has grown rapidly around the world. This trend raises concerns about the potential exposure of bystanders to aerosols from electronic cigarettes, particularly considering that its use in public ...
Esteve Fernández +4 more
doaj +1 more source
Verified Correctness and Security of mbedTLS HMAC-DRBG
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we have proved its cryptographic security--that its output is pseudorandom--using a hybrid game-based proof.
Almeida José Bacelar +8 more
core +1 more source
A local high‐concentration doping enabled by heterophase engineering is proposed for the first time, achieving a remarkable P doping level of 34 at.% and thereby maximizing the advantages of doping for enhancing the K⁺ storage performance of transition metal chalcogenides (TMCs).
Dawei Sha +4 more
wiley +1 more source
Background Globally, a surge in electronic cigarette (e-cigarette) use has been observed in recent years, with youth being the most susceptible group.
Abdullah Alnajem +8 more
doaj +1 more source
Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family [PDF]
We present a new concept of biclique as a tool for preimage attacks, which employs many powerful techniques from differential cryptanalysis of block ciphers and hash functions. The new tool has proved to be widely applicable by inspiring many authors to publish new results of the full versions of AES, KASUMI, IDEA, and Square. In this paper, we show
Dmitry Khovratovich +2 more
openaire +1 more source

